Stay networked. Get informed. Broadcast your projects.
Friends, Diplo's call for applications for the thematic course on Cybersecurity closes in a few days. The course details are below and at http://www.diplomacy.edu/courses/IGCBP-Adv-security. If you would like to apply but need an extension, please let us know at firstname.lastname@example.org
Cybersecurity: course details
Today’s headlines often feature the word ‘cyber’, reporting on threats related to the virtual world: online child abuse, stolen credit cards and virtual identities, malware and viruses, botnets and denial-of-service attacks on corporate or government servers, cyber-espionage, and cyber-attacks on critical infrastructure including nuclear facilities and power supply networks.
What are the real cybersecurity challenges? What is the role of diplomacy, international legal instruments, and regional and national policies in addresses these threats, and how efficient are they? How does international cooperation in cybersecurity work, and what are the roles of the various stakeholders?
The 10-week advanced thematic course in Cybersecurity covers policy challenges, actors, and initiatives related to cybersecurity, and specifically to cybercrime, security of the core infrastructure, cyberwarfare and cyberterrorism, and Internet safety.
By the end of the course, participants should be able to:
The course forms part of the Thematic Phase of Diplo’s Internet Governance Capacity Building Programme (IGCBP). This phase offers in-depth courses that provide deeper understanding of a particular issue. Other courses forming part of this phase - which may run simultaneously or at a later date - include ICT Policy and Strategic Planning, E-participation, History of Internet Governance, Infrastructure and Critical Internet Resources, Intellectual Property Rights, and Privacy and Personal Data Protection.
‘...One side-effect of the rapid integration of the Internet in almost all aspects of human activity is the increased vulnerability of modern society. The Internet is part of the global critical infrastructure. Other core services of modern society, such as electric grids, transport systems, and health services are increasingly dependent on the Internet. As attacks on these systems may cause severe disruption and have huge financial consequences, they are frequent targets.’ (Lexture text 4.3)
The thematic course in Cybersecurity includes one week of hypertext practice and platform familiarisation and introduction, and eight in-depth course texts:
Chapter 1. Introduction to security discusses the historical development of cybersecurity, and distinguishes between the common, narrow, understanding of cybersecurity related to cyber-threats, and broader views which include information security and ‘friendly’ cyber conquest through technological standardisation dominance.
Chapter 2. Cybersecurity threats and building trust reviews common security threats to individuals, such as malware (including spyware, Trojans, viruses), phishing, e-scams and identity theft. To better understand the security-enabling infrastructure, the chapter explains the basics of the authentication and Public Key Infrastructure, including PIN codes and other identifiers, randomly generated passwords and e-signatures, and touches upon the challenge of identity and anonymity online. It concludes by looking at ways to build trust in e-commerce and e-services.
Chapter 3. Cybercrime attempts to define and classify cybercrime while reviewing the history of spam, viruses, intrusion, worms, Trojan horses, denial-of-service attacks and cyber-stalking, and also analyses its economic and social impacts. The chapter then focuses on combatting cybercrime: existing legal frameworks at the global and regional levels, jurisdiction challenges and various law enforcement approaches, computer investigation and e-forensics.
Chapter 4. Security of the core Internet infrastructure explains briefly how the critical components of the Internet work, and discusses the political dimension of global security - the (unilateral) control over the DNS - and technical vulnerabilities such as domain name hijacking, packet interception, DNS poisoning, and DNS spoofing. The chapter also explains the recent technological security upgrade titled DNSSec, and related technical and policy challenges. It then looks at the expected challenges of future networks: Internet of Things/Next Generation Networks and ‘smart networks’.
Chapter 5. Cyberterrorism and cyberwarfare looks at the security and protection of the critical infrastructure - the Internet infrastructure and also water supply facilities, transport, industrial facilities and power plants. It discusses cyberterrorism and possible counteracts, and analyses Denial of Service (DoS) attacks. It also discusses cyberwarfare, reviews the attempts to codify international law with regards to cyberwar, and refers to existing international initiatives and norms and their possible application in cyberspace (i.e. the Geneva Conventions).
Chapter 6. Social aspects of cybersecurity: correlating privacy with security is our first task in this module, with special reflection on social media challenges. We attempt to define online safety, and scan through the challenges of the Web 2.0 era where users are the contributors and the Internet is ubiquitous. We then look at child safety, including cyber-bullying, abuse and sexual exploitation, and violent games, and discuss the ways to address these challenges through policy, education and technology.
Chapter 7. Internet safety: touching upon openness and online freedoms, we look at some of the main issues faced when dealing with Internet safety, including objectionable and harmful content. We then analyse the reliability of information, and look at ethics, health and gender issues.
Chapter 8. Internet security policies and strategies: we dive deeply into the existing legal and policy frameworks. We start with the international framework, including the Council of Europe Convention on Cybercrime, the ITU Global Security Agenda, the Commonwealth Cybercrime Initiative and the OSCE. We also look at regional policies and strategies including European Union, African Union and the Organisation of American States. We review business initiatives in the field of cybersecurity, including initiatives by Microsoft, Intel, Cisco, and SAFEcode, and discuss the importance and risks of public-private partnerships.
‘The course is updated with the latest security issues, so we have a global view of what is going on now, and what organisations are involved at international level in the fight against cybercriminality.’
‘... [the course lecturer] has been very encouraging to think on even the different side which may not be very popular side. So both pros and cons of the issues come to light in the class, encouraging deeper learning.’
Who should apply:
Diplo seeks applications from the following, from both developed and developing countries:
This course may also be of interest to:
This course is conducted online over a period of ten weeks, including one week of classroom orientation, eight weeks of dynamic class content and activities, and one week for the final assignment. Reading materials and tools for online interaction are provided through an online classroom. Each week, participants read the provided lecture texts, adding comments, references, and questions in the form of hypertext entries. The tutor and other participants read and respond to these entries, creating interaction based on the lecture text. During the week, participants complete additional online activities (e.g. further discussion via blogs or forums or quizzes). At the end of the week, participants and tutors meet online in a chat room to discuss the week’s topic.
Courses are based on a collaborative approach to learning, involving a high level of interaction. This course requires a minimum of 7-8 hours of study time per week.
Participants are invited to join Diplo’s global Internet governance online community of over 1,400 members, and to attend monthly webinars and other IG-related events and activities.
The course materials, the e-learning platform, and the working language of the course is English. Applicants should consider whether their reading and writing skills in English are sufficient to follow postgraduate level materials and discussion.
Applicants for the certificate course must have:
Applicants must pay full fees upon official acceptance into the course. The fee includes:
A limited number of partial scholarships (maximum 20%) will be offered to participants from developing and emerging countries. Participants who would like to apply for financial assistance must upload the following documents with their application:
As Diplo's ability to offer scholarship support is limited, candidates are strongly encouraged to seek scholarship funding directly from local or international institutions. Our guide to Finding Scholarships for Online Study may provide you with some useful starting points.
How to apply:
Applicants for certificate courses should apply online.
Late applications will be considered if there are spaces available in the course. Please e-mail email@example.com to request a deadline extension.